US11544706B2 - Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods - Google Patents
Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods Download PDFInfo
- Publication number
- US11544706B2 US11544706B2 US16/396,323 US201916396323A US11544706B2 US 11544706 B2 US11544706 B2 US 11544706B2 US 201916396323 A US201916396323 A US 201916396323A US 11544706 B2 US11544706 B2 US 11544706B2
- Authority
- US
- United States
- Prior art keywords
- network
- token
- card
- computing system
- primary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/26—Debit schemes, e.g. "pay now"
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Definitions
- merchants may obtain and store network-based tokens to facilitate payments in place of storing actual card numbers.
- merchants have to pay a different fee based on the bank that issued the debit card.
- the primary token obtained from token service platform(s) of global front-of-card brands e.g., Visa®
- the commercial framework for secondary tokens is based on transactional and other service fees.
- merchants are unable to effectively and efficiently establish purchase or payment transaction routing preferences on a per transaction basis, so as to predict, plan for, and minimize transaction costs, and maximize net profits. It would thus be beneficial to both merchants and consumers at large to provide a means for preserving merchant routing choice when no other alternative exists in the market today.
- the disclosed systems, methods, and associated software enable merchants to maximize their savings and establish processes to optimize payment processing to benefit both their operations and their customers' experiences.
- Merchants are thereby enabled to have co-resident tokens tied to a single customer payment account and use those secondary tokens to have the choice that they should have under the Durbin Amendment, but currently do not.
- Merchants are enabled to obtain a token that is not restricted to route to the global payment network and to route a tokenized stored credential transaction to any network enabled to support an alternative (e.g., secondary) token.
- the disclosed systems, methods, and software provide a framework for standardization and/or regulatory compliance of payment processing in market contexts involving both front-of-card brands and back-of-card brands attached to the same purchase card being used in respective transactions.
- merchants can, after obtaining a primary token from systems associated with the front-of-card brand, obtain a secondary token from a secondary token service provider than can be used to route transactions to the alternate network (e.g., Pulse®) with the expectation that authorization requests can be processed successfully.
- the disclosed systems, methods, and software provide merchants routing choice for tokenized card-on-file (COF) transactions by enabling secondary tokens to be stored and otherwise maintained/managed side-by-side with primary, front-of-card, tokens.
- COF tokenized card-on-file
- LCM life cycle management
- merchants have: a primary token, assigned by the front-of-card brand that may be subject to routing restrictions; and an alternate (secondary) token that provides routing support to participating alternate (e.g., debit) payment networks.
- the general process flow of the disclosed systems, methods, and software includes: a) cardholder adds primary account number (PAN) to profile; b) merchant identifies tokenized COF-enabled networks via bank identification number (BIN) file inquiry; c) merchant requests and obtains a token from a supported token service provider; d) merchant adds tokenized payment credentials to cardholder profile; and e) merchants have the security of tokens and the power of choice.
- PAN primary account number
- BIN bank identification number
- the disclosed systems, methods, and software To practice the disclosed systems, methods, and software, merchant requirements are such that established systems may be utilized and additional investment in hardware and infrastructure is not necessary, or is, at most, negligible.
- the disclosed systems, methods, and software are integrated into existing systems and networks and are readily adaptable to present and future hard and network infrastructures.
- merchants' operations impacted minimally as compared to present business practices.
- the disclosed systems, methods, and software require merchants to: (i) request and store multiple tokens for each actual debit PAN; (ii) enable token selection based on preferred network route; (iii) directly or indirectly (e.g., via a service provider) access network BIN files to determine secondary network token support and provider.
- merchants may integrate, for example, with Discover®'s token service platform (e.g., DDX®).
- the set up for merchants includes: (A) identifying eligible BINS during card enrollment (e.g., via BIN files); (B) establishing token request and lifecycle management processes; (C) determining network routing preferences; and (D) enabling payment system to route according to preferences.
- merchant customers/cardholders provide their personal and account data to merchant e-commerce website interfaces as usual.
- Customers see their masked actual PAN, and have no awareness of tokens.
- the merchants' databases see a customer's actual PAN name, a unique token PAN, network routes (e.g., Visa®), and token type (e.g., primary for Visa®).
- the merchant database sees another (e.g., a second) unique token PAN for the respective actual PAN name, and for another (e.g., a second) network route (e.g., Pulse®), with an associated (e.g., alternate) token type for the second unique token PAN.
- a second network route e.g., Pulse®
- a method for provisioning tokens may be implemented in a networked computing environment including merchants participating in payment networks.
- the method includes receiving, by a merchant processor, card account data of a purchase card from a cardholder.
- the method includes determining, by the merchant processor, that the card account data includes a multi-token enabled BIN.
- the method includes, in response to determining that the card account data includes the multi-token enabled BIN, receiving and storing, by the merchant processor and in a merchant memory, respectively, a primary token associated with a front-of-card brand of the purchase card.
- the method includes, in response to receiving the primary token, transmitting, by the merchant processor, a request for a secondary token.
- the method includes receiving and storing, by the merchant processor and in the merchant memory, respectively, the secondary token simultaneously with storing the primary token.
- the receiving and storing step of the method of the first aspect may include receiving and storing the primary token from a primary token service provider (TSP).
- TSP primary token service provider
- the transmitting may include transmitting the request for the secondary token to a secondary TSP processor of a secondary TSP associated with a back-of-card brand of the purchase card.
- the method may include generating and transmitting, by the secondary TSP processor, the secondary token to the merchant processor in response to receiving the request for the secondary token from the merchant processor. In any of the above embodiments of the method of the first aspect, the method may include transmitting, by the secondary TSP processor and in response to receiving the request for the secondary token from the merchant processor, a card account data verification request for verification by a card issuer.
- the method may include receiving, by the secondary TSP processor, a verification message indicating that the card account data is verified.
- the step of generating and transmitting the secondary token may include generating and transmitting the secondary token in response to receiving the verification message.
- the purchase card may be a debit card.
- the primary TSP may be associated with a payment network for the front-of-card brand.
- the secondary TSP may be associated with a payment network for the back-of-card brand.
- the secondary TSP may be associated with a debit network for the back-of-card brand.
- a method for processing purchase transactions may be implemented in a networked computing environment including merchants participating in payment networks.
- the method includes receiving, by a merchant processor, a purchase or payment request from a cardholder, where card account data of a purchase card of the cardholder is simultaneously stored in a merchant memory as: (i) a primary token for a front-of-card brand of the purchase card; and (ii) a secondary token for a back-of-card brand of the purchase card.
- the method includes, in response to receiving the purchase or payment request, building, by the merchant processor, a network route list based on merchant-defined predetermined network routing preferences.
- the method includes, for the predetermined network routing preferences indicating a preference for completing the purchase or payment transaction using the secondary token: (a) selecting, by the merchant processor, the secondary token for the purchase or payment request; (b) transmitting, by the merchant processor, an authorization request to a payment network associated with the secondary token; and (c) receiving, by the merchant processor a purchase or payment request confirmation.
- the method of the second aspect may include, before receiving the purchase or payment request confirmation and after transmitting the authorization request to the payment network: (i) detokenizing, by the payment network associated with the secondary token; (ii) transmitting, by the payment network associated with the secondary token, a rebuilt purchase or payment transaction authorization request to an issuer of the purchase card; and (iii) receiving, by the payment network associated with the secondary token, a purchase or payment transaction authorization acknowledgement from the issuer.
- the method may include, in response to receiving the purchase or payment transaction authorization acknowledgment, transmitting, by the payment network associated with the secondary token, the purchase or payment request confirmation to the merchant processor.
- the method may include: (A) selecting, by the merchant processor, the primary token for the purchase or payment request; (B) transmitting, by the merchant processor, an authorization request to a payment network associated with the primary token; and (C) receiving, by the merchant processor, a purchase or payment confirmation from the payment network associated with the primary token indicating that the purchase or payment transaction for the primary token is authorized by an issuer of the purchase card.
- the payment network associated with the primary token may be associated with a payment network for the front-of-card brand.
- the purchase card may be a multi-token enabled purchase card.
- the purchase card may be a debit card.
- the payment network associated with the secondary token may be associated with a payment network for the back-of-card brand.
- the payment network associated with the secondary token may be associated with a debit network for the back-of-card brand
- a method for automatically updating tokenized customer purchase card account data may be implemented in a networked computing environment including merchants participating in payment networks.
- the method includes receiving, by a merchant processor, a life cycle management (LCM) advice for purchase card account data of a cardholder from a network entity having custodial authority over the purchase card account data.
- the method includes, in response to receiving the LCM advice, deleting or suspending, by the merchant processor, simultaneously stored tokens associated with the purchase card account data of the cardholder from a merchant memory, where the tokens include: (i) a primary token for a front-of-card brand of the purchase card; and (ii) a secondary token for a back-of-card brand of the purchase card.
- the method includes updating, by the merchant processor, a customer profile of the cardholder stored as data in the merchant memory.
- the step of deleting or suspending the simultaneously stored tokens may include: (a) deleting, by the merchant processor, the primary token from the merchant memory; (b) in response to deleting the primary token, transmitting, by the merchant processor, an LCM request to a secondary token service provider (TSP) processor of a secondary TSP associated with the secondary token; (c) receiving, by the merchant processor, an LCM response from the secondary TSP processor; and (d) deleting, by the merchant processor, the secondary token from the merchant memory.
- TSP secondary token service provider
- the network entity may be the cardholder, and step of receiving the LCM advice may include receiving a request from the cardholder to delete or update the purchase card account data in the customer profile.
- the network entity may be an issuer of the purchase card, and the step of receiving the LCM advice may include receiving a notification of a cardholder account closure or suspension from the issuer.
- the method may include deleting, by the merchant processor, the purchase card account data from the customer profile.
- the secondary TSP may be associated with a payment network for the back-of-card brand. In any of the above embodiments of the method of the third aspect, the secondary TSP may be associated with a debit network for the back-of-card brand. In any of the above embodiments of the method of the third aspect, the purchase card may be a debit card. In any of the above embodiments of the method of the third aspect, the purchase card may be a multi-token enabled purchase card.
- the disclosed systems, methods, and software distinguishing primary and alternate token types in the merchant database of token PANs associated with actual PAN names enables merchants to select the network they want to route to and utilize the corresponding token for each transaction. Additionally, the disclosed systems, methods, and software enable the back-of-card brand (e.g., Pulse®) to compete for transactions that would not otherwise be feasibly or profitably supported due to global payment network token use restrictions.
- the disclosed systems, methods, and software also provide a mechanism for merchants to both participate in network-based token solutions and maintain routing choice.
- the disclosed systems, methods, and software further enable merchants, cardholders and issuers to benefit from higher authorization rates related to token utilization. Additional and related technical and business benefits and technical effects shall be readily ascertained by persons having ordinary skill in the art upon reading of the detailed descriptions and with reference to the attached drawings and the appended claims.
- FIG. 1 is a schematic diagram of a networked computing environment for provisioning tokens, processing purchase or payment transactions, and/or automatically updating tokenized purchase card account data of customers of online merchants participating in payment networks, according to an embodiment of the disclosure.
- FIG. 2 A is a block diagram of a software architecture for implementing and/or otherwise facilitating, at least in part, the methods of FIGS. 3 , 5 , and 7 , and the processes of FIGS. 4 , 6 , 8 and 9 , according to an embodiment of the disclosure.
- FIG. 2 B is a block diagram of a software architecture for implementing and/or otherwise facilitating, at least in part, the methods of FIGS. 3 , 5 , and 7 , and the processes of FIGS. 4 , 6 , 8 and 9 , according to an embodiment of the disclosure.
- FIG. 3 is a flow chart of a method for provisioning tokens in the networked computing environment of FIG. 1 , according to an embodiment of the disclosure.
- FIG. 4 is a sequence and state diagram of a token provisioning process implemented by the method of FIG. 4 , according to an embodiment of the disclosure.
- FIG. 5 is a flow chart of a method for processing purchase or payment transactions in the networked computing environment of FIG. 1 , according to an embodiment of the disclosure.
- FIG. 6 is a sequence and state diagram of a process for purchase or payment transaction processing implemented by the method of FIG. 5 , according to an embodiment of the disclosure.
- FIG. 7 is a flow chart of a method for automatically updating tokenized purchase card account data of online merchant customers in the networked computing environment of FIG. 1 , according to an embodiment of the disclosure.
- FIG. 8 is a sequence diagram and flow chart of a cardholder-initiated process for updating tokenized purchase card account data implemented by the method of FIG. 7 , according to an embodiment of the disclosure.
- FIG. 9 is a sequence diagram and flow chart of an issuer-initiated process for updating tokenized purchase card account data implemented by the method of FIG. 7 , according to an embodiment of the disclosure.
- FIG. 10 is a sequence diagram and flow chart of an issuer-initiated process for updating tokenized purchase card account data, according to another embodiment of the disclosure.
- FIG. 11 is a block diagram of a processing system for implementing the disclosed systems, methods, and software in the networked computing environment of FIG. 1 , according to an embodiment of the disclosure.
- FIG. 1 is a schematic diagram of a networked computing environment ( 100 ) for provisioning tokens, processing purchase or payment transactions, and/or automatically updating tokenized purchase card account data ( 142 ) of customers ( 104 ) of online merchants ( 108 ) participating in payment (e.g., debit) networks, according to an embodiment of the disclosure.
- Networked computing environment ( 100 ) includes a plurality of network entities, including a cardholder ( 104 ).
- Cardholder ( 104 ) has possession and/or control (e.g., custodial control) over a purchase card ( 106 ) (e.g., a debit, credit, gift, or stored value card) and its associated purchase card ( 106 ) account data ( 110 ).
- cardholder ( 104 ) uses a computing device ( 102 ) to communicate and otherwise interact with a website of an online merchant ( 108 ), including to perform online shopping and make online purchases of goods and/or services offered by, or to otherwise make payments to, merchant ( 108 ).
- the physical card ( 106 ) includes card account data ( 110 ) including a card number, an expiration date, and a card verification value (CVV) number.
- card account data ( 110 ) including a card number, an expiration date, and a card verification value (CVV) number.
- Online shopping by cardholder ( 104 ) using purchase card ( 106 ) enables the cardholder/customer ( 104 ) to initiate and complete online purchase transactions at online merchant(s) ( 108 ) without having to present the physical card ( 106 ).
- Cardholder ( 104 ) may similarly initiate any other payments to merchant ( 108 ) besides for online shopping and/or non-e-commerce contexts, including, without limitation, cardholder ( 104 ) pre-authorized payments initiated by merchant ( 108 ) on behalf of cardholder ( 104 ) (e.g., installment and/or recurring payments).
- Purchase card ( 106 ) includes a Bank Identification Number (BIN) ( 172 ).
- the BIN represents the first 6 to 8 digits of the card number.
- the BIN is at least 1 digit long, but less than 6 digits long.
- the BIN is longer than 8 digits long, but less than the total number of digits of the card number.
- the purchase card ( 106 ) is a multi-BIN enabled purchase card ( 106 ).
- the networked entities in networked computing environment ( 100 ) include one or more merchants ( 108 ).
- merchants ( 108 ) are e-commerce merchants that maintain websites on the World Wide Web (WWW) for offering goods and/or services for sale to cardholders ( 104 ).
- WWW World Wide Web
- merchants ( 108 ) are engaged in both e-commerce and non-ecommerce transactions (e.g., a retail store having an e-commerce website in addition to “brick and mortar” store(s)).
- merchants ( 108 ) receive installment and/or recurring payments (e.g., health club memberships where the merchant stores purchase card information one file, but is not necessarily an online e-commerce merchant).
- merchant ( 108 ) utilizes one or more computing and communication devices.
- These merchant ( 108 ) systems include one or more merchant processors ( 158 ) in communication with at least one merchant memory device (collectively referred to herein as “merchant memory ( 166 )”).
- merchant ( 108 ) includes one or more servers ( 162 ) which implement and/or otherwise perform, at least in part, the functionality of merchant processor ( 158 ) and/or merchant memory ( 166 ).
- merchant memory ( 166 ) stores, as data, a customer profile ( 174 ) of the cardholder/customer ( 104 ).
- Cardholder ( 104 ) enters their personally-identifying information (PII) for storage in the customer profile ( 174 ) and further to the merchant's ( 108 ) commercial purpose.
- Merchant ( 108 ) may instead receive the information for the customer profile ( 174 ) of the cardholder/customer ( 104 ) and then store it in merchant memory ( 166 ).
- the PII includes the cardholder's ( 104 ) name, telephone number, and mailing address.
- the PII includes the cardholder's ( 104 ) purchase card ( 106 ) information, which the merchant processor ( 158 ) may encrypt prior to or during the process of storing the purchase card ( 106 ) information in the customer profile ( 174 ).
- Merchant ( 108 ) stores, as data, the card BIN ( 172 ) of the purchase card ( 106 ) in merchant memory ( 166 ), including, without limitation, in the customer profile ( 174 ).
- Merchant memory ( 166 ) stores, as data, primary ( 176 ) and secondary ( 178 ) tokens associated with the purchase card ( 106 ).
- merchant ( 108 ) stores, as data, the primary ( 176 ) and secondary ( 178 ) tokens simultaneously in merchant memory ( 166 ) as side-by-side tokens ( 164 ).
- primary ( 176 ) and/or secondary ( 178 ) tokens are created and stored during or after encryption and/or tokenization of the cardholder's ( 104 ) purchase card ( 106 ) information.
- the purchase card ( 106 ) is a multi-token enabled purchase card ( 106 ).
- Merchant memory ( 166 ) stores, as data, transaction data ( 182 ) for purchases and/or payments (e.g., installment and/or recurring payments) of cardholder/customer ( 104 ). For instance, cardholder ( 104 ) selects goods and/or services from the offerings of merchant ( 108 ) on their e-commerce website. The selections are stored in a virtual shopping cart ( 180 ), which stores, as data, the identities of selected goods and/or services along with their quantity and unit prices and any applicable sales tax.
- cardholder ( 104 ) checks out and merchant ( 108 ) provides (e.g., mails and/or makes available for download) the goods/services after merchant ( 108 ) successfully receives payment from cardholder ( 104 ) for the online purchase.
- merchant ( 108 ) provides (e.g., mails and/or makes available for download) the goods/services after merchant ( 108 ) successfully receives payment from cardholder ( 104 ) for the online purchase.
- Merchant memory ( 166 ) stores, as data, merchant ( 108 )-defined predetermined network routing preferences ( 170 ) for purchase and/or payment transactions by cardholders ( 104 ).
- e-commerce transactions are routed according to the per transaction cost of processing payments.
- the predetermined network routing preferences ( 170 ) may specify that routing e-commerce transactions to a secondary token service provider (TSP) ( 116 ) is less expensive for merchant ( 108 ) as compared to routing e-commerce transactions to a primary TSP ( 112 ).
- TSP secondary token service provider
- the primary TSP ( 112 ) is associated with a payment network ( 118 ) for a front-of-card brand (e.g., Visa®) of the purchase card ( 106 ).
- the secondary TSP ( 116 ) is associated with a payment (e.g., debit) network ( 119 ) for a back-of-card brand (e.g., Pulse®) of the purchase card ( 106 ).
- a payment e.g., debit
- a back-of-card brand e.g., Pulse®
- merchant processor ( 108 ) creates and stores, as data, a network route list ( 173 ) in merchant memory ( 166 ).
- merchant processor ( 108 ) creates and stores, as data, in merchant memory ( 166 ) network route list ( 173 ) on a per transaction basis.
- the network entities of networked computing environment ( 100 ) include a card issuer ( 120 ). Issuer ( 120 ) has custodial control over account data ( 142 ) of purchase card ( 106 ) and cardholder data ( 138 ) associated with cardholder ( 104 ). In an example, issuer ( 120 ) is a bank and cardholder ( 104 ) is a banking customer of issuer ( 120 ). Issuer ( 120 ) utilizes one or more computing and communication devices. These issuer ( 120 ) systems include one or more issuer processors ( 126 ) in communication with at least one issuer memory ( 139 ). In an example, issuer ( 120 ) includes one or more servers ( 130 ) which implement and/or otherwise perform, at least in part, the functionality of issuer processor ( 126 ) and/or issuer memory ( 139 ).
- issuer memory ( 139 ) stores, as data, the cardholder ( 138 ) and card account ( 142 ) data of the cardholder ( 104 ).
- Issuer ( 120 ) stores, as data, a transaction ledger ( 146 ) for the cardholder's ( 104 ) account, including, without limitation, a running list of transactions performed by cardholder ( 104 ) using purchase card ( 104 ).
- Issuer memory ( 139 ) stores data for life cycle management (LCM) processes ( 150 ) and change of state files ( 154 ).
- LCM life cycle management
- LCM processes ( 150 ) are used by issuer processor ( 126 ) to facilitate updating and/or otherwise changing the cardholder ( 138 ) and/or the card account ( 142 ) data stored in issuer memory ( 139 ).
- the change of state files ( 154 ) contain data related to a status of the purchase card ( 106 ) and or its associated account at issuer ( 120 ).
- the change of state files ( 154 ) contain data representing a status of purchase card ( 106 ) and/or the associated account of cardholder ( 104 ) at issuer ( 120 ).
- change of state files ( 154 ) indicate the status of purchase card ( 106 ) as active, suspended, and/or closed.
- the network entities of networked computing environment ( 100 ) include a payment service provider ( 122 ), an acquirer ( 192 ), and the primary TSP ( 112 ).
- Primary TSP ( 112 ) utilizes one or more computing and communication devices. These primary TSP ( 112 ) systems include one or more primary TSP processors ( 184 ) in communication with at least one primary TSP memory ( 188 ).
- primary TSP ( 112 ) includes one or more servers ( 186 ) which implement and/or otherwise perform, at least in part, the functionality of primary TSP processor ( 184 ) and/or primary TSP memory ( 188 ).
- primary TSP memory ( 188 ) stores, as data, primary tokens ( 176 ) for purchase cards ( 110 ) of a plurality of cardholders ( 104 ).
- primary tokens ( 176 ) stored in primary TSP memory ( 188 ) include primary tokens ( 176 ) stored in merchant memory ( 166 ).
- primary TSP memory ( 188 ) may store purchase card ( 110 ) information of cardholders ( 104 ).
- Primary TSP memory ( 188 ) stores data for primary TSP ( 112 ) LCM processes ( 190 ).
- LCM processes ( 190 ) are used by primary TSP processor ( 126 ) to facilitate updating and/or otherwise changing the primary tokens ( 176 ) for associated purchase cards ( 110 ) in response to changes and/or updates in change of state files ( 154 ) stored in issuer memory ( 134 ) and/or in association with customer profiles ( 174 ) stored in merchant memory ( 166 ).
- the network entities of networked computing environment ( 100 ) include the secondary TSP ( 116 ).
- Secondary TSP ( 116 ) utilizes one or more computing and communication devices.
- These secondary TSP ( 116 ) systems include one or more secondary TSP processors ( 194 ) in communication with at least one secondary TSP memory ( 140 ).
- secondary TSP ( 116 ) includes one or more servers ( 136 ) which implement and/or otherwise perform, at least in part, the functionality of secondary TSP processor ( 194 ) and/or secondary TSP memory ( 140 ).
- secondary TSP memory ( 140 ) stores, as data, secondary tokens ( 178 ) for purchase cards ( 110 ) of a plurality of cardholders ( 104 ).
- secondary TSP ( 116 ) stores the secondary tokens ( 178 ) in secondary TSP memory ( 140 ) as a token vault ( 128 ).
- secondary tokens ( 178 ) stored in secondary TSP memory ( 140 ) include at least one of those secondary tokens ( 176 ) stored in merchant memory ( 166 ).
- secondary TSP memory ( 140 ) may store purchase card ( 110 ) information of cardholders ( 104 ).
- Secondary TSP memory ( 140 ) stores data for secondary TSP ( 116 ) LCM processes ( 148 ).
- LCM processes ( 148 ) are used by secondary TSP processor ( 194 ) to facilitate updating and/or otherwise changing the secondary tokens ( 176 ) for associated purchase cards ( 110 ) in response to changes and/or updates in change of state files ( 154 ) stored in issuer memory ( 134 ) and/or in association with customer profiles ( 174 ) stored in merchant memory ( 166 ).
- Secondary TSP memory ( 140 ) stores, as data, token request processes ( 144 ) and network routing preferences ( 152 ).
- network routing preferences ( 152 ) stored in secondary TSP memory ( 140 ) include the predetermined network routing preferences ( 170 ) stored in merchant memory ( 166 ).
- secondary TSP processor ( 158 ) updates and/or otherwise changes token request ( 144 ) and/or network routing ( 152 ) preferences based on corresponding changes made by merchant processor ( 158 ) to the predetermined network routing preferences ( 170 ) (e.g., based on variations in per transaction routing and/or processing costs).
- the network entities of networked computing environment ( 100 ) include a Discover® Network (DN) account updater ( 132 ).
- DN account updater ( 132 ) facilitates updating secondary tokens ( 178 ) stored in merchant memory ( 166 ).
- utilizing DN account updater ( 132 ) in the networked computing environment ( 100 ) supplants the need to utilize secondary TSP ( 116 ) for updating, deleting, or otherwise changing the merchant ( 108 )-stored secondary tokens ( 178 ).
- DN account updater ( 132 ) utilizes one or more computing and communication devices.
- DN account updater ( 132 ) systems include one or more DN account updater processors ( 156 ) in communication with at least one DN account updater memory ( 168 ).
- DN account updater ( 132 ) includes one or more servers ( 160 ) which implement and/or otherwise perform, at least in part, the functionality of DN account updater processor ( 156 ) and/or DN account updater memory ( 168 ).
- DN account updater memory ( 168 ) stores, as data, the change of state files ( 154 ) received, from time to time, from issuer ( 120 ).
- DN account updater memory ( 168 ) stores data for life cycle management (LCM) processes ( 198 ) and the change of state files ( 154 ) received from issuer ( 120 ).
- LCM processes ( 198 ) are used by DN account updater processor ( 156 ) to facilitate updating and/or otherwise changing (e.g., suspending and/or deleting) secondary tokens ( 178 ) stored in merchant memory ( 166 ) and associated with purchase cards ( 106 ).
- issuers ( 120 ) participate in PULSE® account updating using DN account updater ( 132 , thus enabling PULSE® to maintain token/PAN mapping.
- merchants ( 108 ) continue to participate in account updater services of global (e.g., front-of-card) brands, either instead of, or in addition to, the DN account updater ( 132 )-based process.
- Processors of the above-described network entities of networked computing environment ( 100 ) may be located in the networked computing environment ( 100 ). Processors of the network entities may be located remote from networked computing environment ( 100 ). In another example, network computing environment ( 100 ) processors may be located both in networked computing environment ( 100 ) and remote from networked computing environment ( 100 ). Processors of the network entities may be included in one or more servers (e.g., as shown in FIG. 1 ) and/or other suitable network appliances and/or computing devices, including, without limitation, as part of a blockchain-based architecture. Similarly, memory devices of the above-described network entities of networked computing environment ( 100 ) may be located in the networked computing environment ( 100 ).
- servers e.g., as shown in FIG. 1
- memory devices of the above-described network entities of networked computing environment ( 100 ) may be located in the networked computing environment ( 100 ).
- Memory devices ( 304 ) of the network entities may be located remote from networked computing environment ( 100 ).
- network computing environment ( 100 ) memory devices may be located both in networked computing environment ( 100 ) and remote from networked computing environment ( 100 ).
- Memory devices of the network entities may be included in one or more servers (e.g., as shown in FIG. 1 ) and/or other suitable network appliances and/or computing devices, including, without limitation, as part of a blockchain-based architecture.
- processors and memory devices of network entities of networked computing environment ( 100 ) are situated, and operate, in a distributed network architecture.
- processors and memory devices of the disclosed network entities are situated, and operate, in a centralized network architecture.
- processors of the above-described network entities are programmed, and respective memory devices are configured, to implement and/or otherwise perform, at least in part, one or more of the disclosed steps of the methods described below, including, without limitation, using networked computing environment ( 100 ).
- FIGS. 2 A and 2 B are block diagrams of software architectures for implementing and/or otherwise facilitating, at least in part, any or all of the below-described methods of FIGS. 3 , 5 , and 7 , and processes of FIGS. 4 , 6 , and 8 , including, without limitation, using networked computing environment ( 100 ), according to an embodiment of the disclosure.
- memory device(s) e.g., 144 and 166
- the above-described network entities of networked computing environment ( 100 ) include at least one non-transient computer-readable medium (e.g., 600 a and 600 b ).
- Non-transient computer-readable medium stores as software (e.g., 601 a and 601 b ) processor-executable instructions for implementing and/or otherwise facilitating, at least in part, the disclosed steps of any or all of the methods and processes described below, including, without limitation, using networked computing environment ( 100 ).
- processor-executable instructions stored as software ( 601 a and 601 b ) include one or more software modules (e.g., 602 a and 602 b ).
- the processor-executable instructions When executed by the processor(s) of the above-described network entities of networked computing environment ( 100 ) (e.g., one or more of: processor 126 , 156 , 158 , 184 , and 194 ) that are in communication with memory device(s) (e.g., one or more of: memory 139 , 140 , 166 , 168 , and 188 ), the processor-executable instructions cause the one or more processors to implement and/or otherwise perform, at least in part, one or more of the steps of any or all of the below-described methods and processes, including, without limitation, using networked computing environment ( 100 ).
- networked computing environment ( 100 ) In networked computing environment ( 100 ), memory devices (e.g., 139 , 140 , 166 , 168 , and 188 ) and processors (e.g., 126 , 156 , 158 , 184 , and 194 ) are in communication with one another via, and communicate with one another using electrical, electromagnetic, magnetic, optical, and/or other suitable signals (e.g., encoded data signals) transmitted and/or received through, a network ( 114 ).
- network ( 114 ) is, or includes, the Internet.
- networked computing environment ( 100 ) communication using network ( 114 ) includes wireless communication equipment and protocols.
- networked computing environment ( 100 ) communication using network ( 114 ) includes wired communication equipment and protocols.
- networked computing environment ( 100 ) communication using network ( 114 ) includes a combination of wireless and wired communication equipment and protocols.
- networked computing environment ( 100 ) communication using network ( 114 ) includes wireless and/or wired communication equipment and protocols for utilizing cloud-based data processing, data storage, and/or data communication resources.
- networked computing environment ( 100 ) includes one or more users (not shown in FIG. 1 ) who perform and/or otherwise facilitate, at least in part, operations and/or steps of the methods described below.
- User(s) in networked computing environment ( 100 ) may include human user(s), user(s) composed of computing resources, and/or combinations thereof.
- user(s) include user groups (e.g., network groups) having operational and/or use authorization limited to one or more, but less than the total number of network entities in networked computing environment ( 100 ).
- FIG. 3 is a flow chart of a method (e.g., method ( 240 )) for provisioning tokens (e.g., primary ( 176 ) and/or secondary ( 178 ) tokens) in a networked computing environment (e.g., networked computing environment ( 100 )) including merchants ( 108 ) participating in payment (e.g., debit) networks.
- method 240 includes receiving ( 242 ), by a merchant processor ( 158 ), card account data ( 110 ) of a purchase card ( 106 ) from a cardholder ( 104 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a receiving module ( 604 ).
- Method ( 240 ) includes determining ( 244 ), by the merchant processor ( 158 ), that the card account data ( 110 ) includes a multi-token enabled BIN ( 172 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a determining module ( 606 ).
- Method ( 240 ) includes receiving and storing ( 246 ), by the merchant processor ( 158 ) and in the merchant memory ( 166 ), respectively, the primary token ( 176 ) associated with the front-of-card brand of the purchase card ( 106 ).
- the merchant processor ( 158 ) performs the receiving and storing ( 246 ) step in method ( 240 ) in response to determining ( 244 ) that the card account data ( 110 ) includes the multi-token enabled BIN ( 172 ).
- the receiving and storing ( 246 ) step includes receiving and storing ( 246 ) the primary token ( 176 ) from the primary TSP ( 112 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in receiving ( 608 ) and/or storing ( 610 ) module(s).
- Method ( 240 ) includes transmitting ( 248 ), by the merchant processor ( 158 ), a request for a secondary token ( 178 ).
- the merchant processor ( 158 ) performs the transmitting ( 248 ) step in method ( 240 ) in response to receiving ( 246 ) the primary token ( 176 ).
- the transmitting ( 248 ) step includes transmitting ( 248 ) the request for the secondary token ( 178 ) to the secondary TSP processor ( 194 ) of the secondary TSP ( 116 ) associated with the back-of-card brand of the purchase card ( 106 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a transmitting module ( 611 ).
- Method ( 240 ) includes receiving and storing ( 252 ), by the merchant processor ( 158 ) and in the merchant memory ( 166 ), respectively, the secondary token ( 178 ) simultaneously with storing ( 246 ) the primary token ( 176 ).
- the primary token ( 176 ) is received and stored ( 246 ) in merchant memory ( 166 ) prior to the secondary token ( 178 ) being received and stored ( 252 ) in merchant memory ( 166 ).
- the result is that the primary ( 176 ) and secondary ( 178 ) are both stored in merchant memory ( 166 ) as co-existent, side-by-side tokens ( 164 ).
- the primary ( 176 ) and secondary ( 178 ) may be stored in merchant memory ( 166 ) as side-by-tokens ( 164 ) regardless of the order in which the primary ( 176 ) and secondary ( 178 ) tokens are received by the merchant processor ( 158 ).
- the primary ( 176 ) and secondary ( 178 ) tokens may both be received substantially simultaneously by the merchant processor ( 158 ), with the result being the same—namely, simultaneous storage of primary ( 176 ) and secondary ( 178 ) tokens as side-by-side tokens ( 164 ) in the merchant memory ( 166 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in receiving ( 612 ) and/or storing ( 614 ) module(s).
- method ( 240 ) includes generating and transmitting ( 250 ), by the secondary TSP processor ( 194 ), the secondary token ( 178 ) to the merchant processor ( 158 ).
- the secondary TSP processor ( 194 ) generates and transmits ( 250 ) the secondary token ( 178 ) to the merchant processor ( 158 ) in response to receiving the request for the secondary token ( 178 ) from the merchant processor ( 158 ).
- the secondary TSP processor(s) ( 194 ) execute processor-executable instructions stored in generating ( 615 ) and/or transmitting ( 617 ) module(s).
- method ( 240 ) includes transmitting ( 253 ), by the secondary TSP processor ( 194 ), a card account data ( 110 ) verification request for verification by a card issuer ( 120 ).
- the secondary TSP processor ( 194 ) transmits ( 253 ) the card account data ( 110 ) verification request in response to receiving the request for the secondary token ( 178 ) from the merchant processor ( 158 ). As described below with reference to FIG.
- the secondary TSP processor ( 194 ) may, in fact, transmit ( 253 ) the card account data ( 110 ) verification request indirectly to issuer ( 120 ) by way of the selected network ( 124 ) (e.g., primary ( 112 ) or secondary ( 116 ) TSP, selected based on the predetermined network routing preferences ( 170 )), and this verification request may be transmitted in conjunction with a token processing request to issuer ( 120 ).
- the secondary TSP processor(s) ( 194 ) execute processor-executable instructions stored in a transmitting module ( 619 ).
- method ( 240 ) includes receiving ( 254 ), by the secondary TSP processor ( 194 ), a verification message indicating that the card account data ( 110 ) is verified.
- the secondary TSP processor(s) ( 194 ) execute processor-executable instructions stored in a receiving module ( 621 ).
- the step of generating and transmitting ( 250 ) the secondary token ( 178 ) includes generating and transmitting ( 250 ) the secondary token ( 178 ) in response to receiving ( 254 ) the verification message.
- FIG. 4 is a sequence and state diagram of a token provisioning process (e.g., process ( 300 )) implemented by the method of FIG. 4 (e.g., method ( 240 )), according to an embodiment of the disclosure.
- Process ( 300 ) begins with a start state ( 302 ) and proceeds to block ( 304 ), which is performed by cardholder ( 104 ).
- block ( 304 ) cardholder ( 104 ) adds his or her card account data ( 142 ) to the customer profile ( 174 ) of the merchant ( 108 ) website.
- the cardholder ( 104 ) may provide the card account data ( 142 ) to the merchant ( 108 ) through channels other than a merchant ( 108 ) website, and merchant ( 108 ) store that information in merchant memory ( 166 ) and/or elsewhere.
- process ( 300 ) proceeds to block ( 306 ), which is performed by merchant ( 108 ).
- merchant processor ( 158 ) reads the card BIN ( 172 ).
- process ( 300 ) proceeds to logic branch ( 308 ), also performed by merchant ( 108 ).
- merchant processor ( 158 ) determines if the card BIN ( 172 ) read in block ( 306 ) is a multi-token enabled BIN ( 172 ). If merchant processor ( 158 ) determines in branch ( 308 ) that the card BIN ( 172 ) is not multi-token enabled, then process ( 300 ) proceeds to an end state ( 310 ).
- process ( 300 ) proceeds to block ( 312 ), also performed by merchant ( 108 ).
- merchant processor ( 158 ) sends a token request (e.g., a request for the primary token ( 176 )) to the primary TSP ( 112 ).
- a token request e.g., a request for the primary token ( 176 )
- process ( 300 ) proceeds to block ( 313 ), which is performed by primary TSP ( 112 ).
- primary TSP processor ( 184 ) processes the token request received from the merchant ( 108 ).
- process ( 300 ) proceeds to block ( 314 ), which is performed by the selected network ( 124 ) (e.g., primary ( 112 ) or secondary ( 116 ) TSP, selected based on the predetermined network routing preferences ( 170 )).
- the selected network ( 124 ) receives transaction information from primary TSP ( 184 ).
- process ( 300 ) proceeds to block ( 315 ), which is performed by the selected network ( 124 ).
- the selected network ( 124 ) transmits the transaction information to the purchase card ( 106 ) issuer ( 120 ).
- process ( 300 ) proceeds to block ( 316 ), which is performed by the purchase card ( 106 ) issuer ( 120 ).
- issuer processor ( 126 ) verifies the cardholder ( 104 ) account (e.g., the account data ( 142 ) associated with the primary token ( 176 )).
- process ( 300 ) proceeds to logic branch ( 317 ), also performed by issuer ( 120 ).
- issuer ( 120 ) e.g., using issuer processor ( 126 ) determines if the cardholder ( 104 ) account is verified. If issuer processor ( 126 ) determines in branch ( 317 ) that the cardholder ( 104 ) account is not verified, then process ( 300 ) proceeds to end state ( 310 ).
- process ( 300 ) proceeds to block ( 318 ), which is performed by the selected network ( 124 ).
- the selected network ( 124 ) receives account verification from issuer ( 120 ).
- process ( 300 ) proceeds to block ( 319 ), which is performed by the selected network ( 124 ).
- the selected network ( 124 ) transmits the account verification to the primary TSP ( 112 ).
- primary TSP processor ( 184 ) generates and/or provisions the primary token ( 176 ).
- process ( 300 ) proceeds to block ( 322 ), which is performed by merchant ( 108 ).
- merchant processor ( 158 ) stores the primary token ( 176 ) in merchant memory ( 166 ).
- process ( 300 ) proceeds to block ( 324 ), also performed by merchant ( 108 ).
- merchant processor ( 158 ) sends a token request (e.g., a request for the secondary token ( 178 )) to the secondary TSP ( 116 ).
- process ( 300 ) proceeds to block ( 326 ), which is performed by secondary TSP ( 116 ).
- secondary TSP processor ( 194 ) processes the token request received from merchant ( 108 ).
- process ( 300 ) proceeds to block ( 327 ), which is performed by the selected network ( 124 ).
- the selected network ( 124 ) receives, and then transmits, the transaction information to the purchase card ( 106 ) issuer ( 120 ).
- process ( 300 ) proceeds to block ( 328 ), which is performed by issuer ( 120 ).
- issuer processor ( 126 ) verifies the cardholder ( 104 ) account (e.g., the account data ( 142 ) associated with the secondary token ( 178 )).
- process ( 300 ) proceeds to logic branch ( 330 ), also performed by issuer ( 120 ).
- issuer processor ( 126 ) determines if the cardholder ( 104 ) account is verified. If issuer processor ( 126 ) determines in branch ( 330 ) that the cardholder ( 104 ) account is not verified, then process ( 300 ) proceeds to end state ( 310 ).
- process ( 300 ) proceeds to block ( 331 ), which is performed by the selected network ( 124 ).
- the selected network ( 124 ) receives, and then transmits, the account verification to the secondary TSP ( 116 ).
- process ( 300 ) proceeds to block ( 332 ), which is performed by secondary TSP ( 116 ).
- secondary TSP processor ( 194 ) generates and/or provisions the secondary token ( 178 ).
- process ( 300 ) proceeds to block ( 334 ), which is performed by merchant ( 108 ).
- merchant processor ( 158 ) stores the secondary token ( 178 ) in merchant memory ( 166 ) (e.g., as side-by-side tokens ( 164 ) with primary token ( 176 )). From block ( 334 ), process ( 300 ) proceeds to end state ( 310 ).
- FIG. 5 is a flow chart of a method (e.g., method ( 260 )) for processing purchase and/or payment transactions in a networked computing environment (e.g., networked computing environment ( 100 )) including merchants ( 108 ) participating in payment (e.g., debit) networks.
- method ( 260 ) includes receiving ( 262 ), by merchant processor ( 158 ), a purchase (e.g., checkout) or payment request from a cardholder/customer ( 104 ) (or. alternatively, from merchant ( 108 ) that is pre-authorized by cardholder ( 104 )).
- method ( 260 ) includes simultaneously storing, by the merchant processor ( 158 ), the card account data ( 110 ) as: (i) the primary token ( 176 ) for the front-of-card brand of the purchase card ( 106 ); and (ii) the secondary token ( 178 ) for the back-of-card brand of the purchase card ( 106 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a receiving module ( 622 ).
- Method ( 260 ) includes building ( 264 ), by the merchant processor ( 158 ), network route list ( 173 ) based on merchant ( 108 )-defined predetermined network routing preferences ( 170 ).
- merchant processor ( 158 ) performs the building ( 264 ) step in method ( 260 ) in response to receiving ( 262 ) the purchase or payment request from the cardholder ( 104 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a building module ( 624 ).
- method ( 260 ) includes selecting ( 266 ), by the merchant processor ( 158 ), the secondary token ( 178 ) for the purchase or payment request.
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a selecting module ( 626 ).
- the merchant processor(s) ( 158 ) interrogate every purchase or payment transaction as to whether it will be routed to the primary (e.g., Mastercard®) or secondary (e.g., Pulse®) network.
- method ( 260 ) includes transmitting ( 268 ), by the merchant processor ( 158 ), an authorization request to a payment (e.g., debit) network ( 119 ) associated with the secondary token ( 178 ).
- this authorization request is transmitted ( 268 ) to secondary TSP processor ( 194 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a transmitting module ( 628 ).
- method ( 260 ) includes receiving ( 271 ), by the merchant processor ( 158 ), an purchase or payment request confirmation.
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a receiving module ( 630 ).
- the method ( 260 ) also includes detokenizing ( 270 ), by the payment network ( 119 ) associated with the secondary token ( 178 ), the secondary token ( 178 ).
- the detokenizing ( 270 ) step is performed in method ( 260 ) before receiving ( 271 ) the purchase or payment request confirmation and after transmitting ( 268 ) the authorization request to the payment network ( 119 ) associated with the secondary token ( 178 ).
- the secondary TSP processor ( 194 ) detokenizes ( 270 ) the secondary token ( 178 ).
- the secondary TSP processor(s) ( 194 ) execute processor-executable instructions stored in a detokenizing module ( 631 ).
- the method ( 260 ) also includes transmitting ( 272 ), by the payment network ( 119 ) associated with the secondary token ( 178 ), a rebuilt purchase or payment transaction authorization request to an issuer ( 120 ) of the purchase card ( 106 ).
- the transmitting ( 272 ) step is performed in method ( 260 ) before receiving ( 271 ) the purchase or payment request confirmation and after transmitting ( 268 ) the authorization request to the payment network ( 119 ) associated with the secondary token ( 178 ).
- the secondary TSP processor ( 194 ) transmits ( 272 ) the rebuilt purchase or payment transaction authorization request to the issuer ( 120 ).
- the secondary TSP processor(s) ( 194 ) execute processor-executable instructions stored in a transmitting module ( 633 ).
- the method ( 260 ) also includes receiving ( 274 ), by the payment network ( 119 ) associated with the secondary token ( 178 ), a purchase or payment transaction authorization acknowledgement from the issuer ( 120 ).
- the receiving ( 274 ) step is performed in method ( 260 ) before receiving ( 271 ) the purchase or payment request confirmation and after transmitting ( 268 ) the authorization request to the payment network ( 119 ) associated with the secondary token ( 178 ).
- the secondary TSP processor ( 194 ) receives ( 274 ) the purchase or payment transaction authorization acknowledgement from the issuer ( 120 ).
- the secondary TSP processor(s) ( 194 ) execute processor-executable instructions stored in a receiving module ( 635 ).
- method ( 260 ) includes transmitting ( 275 ), by the payment network ( 119 ) associated with the secondary token ( 178 ), the purchase or payment request confirmation to the merchant processor ( 158 ).
- the transmitting ( 275 ) step is performed in method ( 260 ) in response to the payment network ( 119 ) associated with the secondary token ( 178 ) receiving ( 274 ) the purchase or payment transaction authorization acknowledgment from issuer ( 120 ).
- the secondary TSP processor ( 194 ) transmits ( 275 ) the purchase or payment request confirmation to the merchant processor ( 158 ).
- the secondary TSP processor(s) ( 194 ) execute processor-executable instructions stored in a transmitting module ( 637 ).
- method ( 260 ) further includes selecting ( 276 ), by the merchant processor ( 158 ), the primary token ( 176 ) for the purchase or payment request.
- selecting ( 276 ) step is implemented and/or otherwise facilitated by software ( 601 a )
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a selecting module ( 638 ).
- method ( 260 ) further includes transmitting ( 277 ), by the merchant processor ( 158 ), an authorization request to a payment network ( 118 ) associated with the primary token ( 176 ).
- merchant processor(s) ( 158 ) transmit ( 277 ) this authorization request to the primary TSP ( 112 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a transmitting module ( 640 ).
- method ( 260 ) further includes receiving ( 279 ), by the merchant processor ( 158 ), a purchase or payment request confirmation from the payment network ( 118 ) associated with the primary token ( 176 ).
- the purchase or payment request confirmation received by the merchant processor ( 158 ) from the payment network ( 118 ) associated with the primary token ( 176 ) indicates (e.g., to the merchant processor ( 158 )) that the purchase or payment transaction for the primary token ( 176 ) is authorized by the issuer ( 120 ) of the purchase card ( 106 ).
- merchant processor(s) ( 158 ) receive ( 279 ) this purchase or payment request confirmation from the primary TSP ( 112 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a receiving module ( 642 ).
- FIG. 6 is a sequence and state diagram of a process (e.g., process ( 500 )) for purchase and/or payment transaction processing implemented by the method of FIG. 5 (e.g., method ( 260 )), according to an embodiment of the disclosure.
- Process ( 500 ) begins with a start state ( 502 ) and proceeds to block ( 504 ), which is performed by cardholder ( 104 ).
- block ( 504 ) cardholder ( 104 ) (or, alternatively, merchant ( 108 ) that is pre-authorized by cardholder ( 104 )), initiates a purchase or payment process after, for example and without limitation, selecting goods and/or services offered for sale on a merchant ( 108 ) online shopping website and adding the selected items to the shopping cart ( 180 ).
- process ( 500 ) proceeds to block ( 506 ), which is performed by merchant ( 108 ).
- merchant processor ( 158 ) builds the network route list.
- process ( 500 ) proceeds to block ( 508 ), also performed by merchant ( 108 ).
- merchant processor ( 508 ) selects a token (e.g., one of the primary ( 176 ) and secondary ( 178 ) tokens stored as side-by-side tokens ( 164 ) in merchant memory ( 166 )) based on routing preferences (e.g., based on the predetermined network routing preferences ( 170 )).
- process ( 500 ) proceeds to block ( 510 ), also performed by merchant ( 108 ).
- merchant processor ( 158 ) sends an authorization request to the selected network ( 124 ) (e.g., primary ( 112 ) or secondary ( 116 ) TSP, selected based on the predetermined network routing preferences ( 170 )).
- process ( 500 ) proceeds to block ( 512 ), which is performed by the selected network ( 124 ).
- processor(s) of the selected network ( 124 ) create and/or send a detokenize request to the token vault ( 127 or 128 , as shown in FIG. 1 ).
- process ( 500 ) proceeds to block ( 514 ), which is implemented, at least in part, by token vault ( 127 or 128 ).
- the primary ( 176 ) token or the secondary ( 178 ) token is detokenized (e.g., by primary ( 184 ) or secondary ( 194 ) TSP processor) in response to the detokenize request received from the selected network ( 124 ).
- a response to the detokenize request of block ( 512 ) includes an encrypted message.
- the network routing logic function(s) of, for instance, process ( 500 ) moves from the acquirer ( 192 ) to the merchant ( 108 ) wallet provider/e-commerce platform.
- process ( 500 ) proceeds to block ( 516 ), which is performed by the selected network ( 124 ).
- selected network ( 124 ) processor e.g., primary ( 184 ) or secondary ( 194 ) TSP processor
- rebuilds e.g., decrypts
- the issuer 120
- process ( 500 ) proceeds to block ( 518 ), which is performed by issuer ( 120 ).
- issuer processor ( 126 ) authorizes the purchase or payment transaction between the cardholder ( 104 ) and the merchant ( 108 ), which involves the purchase card ( 106 ).
- process ( 500 ) proceeds to logic branch ( 520 ), which is performed by issuer ( 120 ).
- issuer processor ( 126 ) determines if the transaction is authorized. If issuer processor ( 126 ) determines in branch ( 520 ) that the purchase or payment transaction is not authorized, then process ( 500 ) proceeds to an end state ( 522 ).
- the end state ( 522 ) transition in process ( 500 ) includes notifying the merchant ( 108 ) and/or the cardholder ( 106 ) that the purchase or payment transaction is not authorized.
- process ( 500 ) proceeds to block ( 524 ), which is performed by the selected network ( 124 ).
- an affirmative response to the authorization request of block ( 516 ) includes an encrypted message.
- processor of the selected network ( 124 ) rebuilds (e.g., decrypts) the message and forwards the issuer ( 120 ) response to the merchant ( 108 ).
- process ( 500 ) proceeds to block ( 526 ), which is performed by merchant ( 108 ).
- process ( 500 ) proceeds to end state ( 522 ).
- process ( 500 ) transitions from end state ( 522 ) to start state ( 502 ) iteratively for each of a plurality of purchase and/or payment transactions.
- a plurality of instances of process ( 500 ) run in parallel for processing a plurality of purchase and/or payment transactions simultaneously.
- FIG. 7 is a flow chart of a method (e.g., method ( 280 )) for automatically updating tokenized purchase card account data ( 142 ) of customers ( 104 ) of merchants ( 108 ) participating in payment (e.g., debit) networks in a networked computing environment ( 100 ).
- method 260 includes receiving ( 282 ), by merchant processor ( 158 ), a life cycle management (LCM) advice for purchase card ( 106 ) account data ( 142 ) of cardholder ( 104 ) from a network entity having custodial authority over the purchase card ( 106 ) account data ( 142 ).
- the receiving ( 282 ) step is implemented and/or otherwise facilitated by software ( 601 a )
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a receiving module ( 644 ).
- the network entity having custodial control over the purchase card ( 106 ) account data ( 142 ) is the cardholder ( 104 ).
- the receiving ( 282 ) step of method ( 280 ) includes receiving ( 281 ) a request from the cardholder ( 104 ) to delete, update, and/or otherwise change the purchase card ( 106 ) account data ( 142 ) in the customer profile ( 174 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a receiving module ( 646 ).
- the network entity having custodial control over the purchase card ( 106 ) account data ( 142 ) is the issuer ( 120 ) of the purchase card ( 106 ).
- the receiving ( 282 ) step of method ( 280 ) includes receiving ( 283 ) a notification of a cardholder ( 104 ) account closure or suspension from the issuer ( 120 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a receiving module ( 648 ).
- Method ( 280 ) includes deleting or suspending ( 284 ), by the merchant processor ( 158 ), simultaneously stored tokens associated with the purchase card ( 106 ) account data ( 142 ) of the cardholder ( 104 ) from a merchant memory ( 166 ).
- the simultaneously stored tokens include the primary ( 176 ) and secondary ( 178 ) tokens.
- the primary ( 176 ) and secondary ( 178 ) tokens are stored as side-by-side tokens ( 164 ) in merchant memory ( 166 ).
- the deleting or suspending ( 284 ) step is performed in method ( 280 ) in response to receiving ( 282 ) the LCM advice from the network entity having custodial control over the purchase card ( 106 ) account data ( 142 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in deleting ( 650 ) and/or suspending ( 652 ) module(s).
- the deleting or suspending ( 284 ) step includes deleting ( 288 ), by the merchant processor ( 158 ), the primary token ( 176 ) from the merchant memory ( 166 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a deleting module ( 654 ).
- the deleting or suspending ( 284 ) step also includes transmitting ( 290 ), by the merchant processor ( 158 ), an LCM request to the secondary TSP processor ( 194 ) of the secondary TSP ( 116 ) associated with the secondary token ( 178 ).
- the transmitting ( 290 ) step is performed in method ( 280 ) in response to the deleting ( 288 ) of the primary token ( 176 ) by the merchant processor ( 158 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a transmitting module ( 656 ).
- the deleting or suspending ( 284 ) step also includes receiving ( 292 ), by the merchant processor ( 158 ), an LCM response from the secondary TSP processor ( 194 ). In embodiments for which the receiving ( 292 ) step is implemented and/or otherwise facilitated by software ( 601 a ), the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a receiving module ( 658 ). In the embodiment, the deleting or suspending ( 284 ) step further includes deleting ( 294 ), by the merchant processor ( 158 ), the secondary token ( 178 ) from the merchant memory ( 166 ). In embodiments for which the deleting ( 294 ) step is implemented and/or otherwise facilitated by software ( 601 a ), the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a deleting module ( 660 ).
- method ( 280 ) also includes deleting ( 296 ), by the merchant processor ( 158 ), the purchase card ( 106 ) account data ( 142 ) from the customer profile ( 174 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in a deleting module ( 664 ).
- Method ( 280 ) includes updating ( 286 ), by the merchant processor ( 158 ), the customer profile ( 174 ) of the cardholder ( 104 ) stored as data in the merchant memory ( 166 ).
- the updating ( 286 ) step is performed in method ( 280 ) during and/or after the deleting or suspending ( 284 ) step(s) is/are performed in method ( 280 ).
- the merchant processor(s) ( 158 ) execute processor-executable instructions stored in an updating module ( 662 ).
- FIG. 8 is a sequence diagram and flow chart of a cardholder ( 104 )-initiated process (e.g., process 800 ) for updating tokenized purchase card account data implemented by the method of FIG. 7 (e.g., method ( 280 )), according to an embodiment of the disclosure.
- process ( 800 ) enables cardholder ( 104 ) to delete payment credentials from the respective merchant ( 108 ) profile.
- Process ( 800 ) begins with a start state ( 802 ) and proceeds to block ( 804 ), which is performed by cardholder ( 104 ).
- cardholder ( 104 ) sends a request to delete, change, and/or update card account data ( 142 ) from his or her customer profile ( 174 ) stored by the merchant ( 108 ) (e.g., to delete the actual PAN name of their purchase card ( 106 )).
- process ( 800 ) proceeds to block ( 806 ), which is performed by merchant ( 108 ).
- merchant processor ( 158 ) sends a primary token ( 176 ) LCM request to the primary TSP ( 112 ).
- process ( 800 ) proceeds to block ( 808 ), which is performed by the primary TSP ( 112 ).
- primary TSP processor ( 184 ) processes the primary token ( 176 ) LCM request. From block ( 808 ), process ( 800 ) proceeds to block ( 810 ), also performed by primary TSP ( 112 ). In block ( 810 ), primary TSP processor ( 184 ) sends a primary token ( 176 ) LCM response to the merchant ( 108 ).
- process ( 800 ) proceeds to block ( 812 ), which is performed by merchant ( 108 ).
- merchant processor ( 158 ) deletes the primary token ( 176 ) associated with cardholder/customer ( 104 ) from merchant memory ( 166 ).
- process ( 800 ) proceeds to block ( 814 ), also performed by merchant ( 108 ).
- merchant processor ( 158 ) sends a secondary token ( 178 ) LCM request to the secondary TSP ( 116 ).
- process ( 800 ) proceeds to block ( 816 ), which is performed by the secondary TSP ( 116 ).
- secondary TSP processor ( 194 ) processes the secondary token ( 178 ) LCM request. From block ( 816 ), process ( 800 ) proceeds to block ( 818 ), also performed by secondary TSP ( 116 ). In block ( 818 ), secondary TSP processor ( 194 ) sends a secondary token ( 178 ) LCM response to the merchant ( 108 ). From block ( 818 ), process ( 800 ) proceeds to block ( 820 ), which is performed by merchant ( 108 ). In block ( 820 ), merchant processor ( 158 ) deletes the secondary token ( 178 ) associated with cardholder/customer ( 104 ) from merchant memory ( 166 ).
- process ( 800 ) proceeds to block ( 822 ), also performed by merchant ( 108 ).
- merchant processor ( 158 ) deletes the card account data ( 142 ) from the customer profile ( 174 ) of the cardholder/customer ( 104 ).
- process ( 800 ) proceeds to an end state ( 824 ).
- process ( 800 ) transitions from end state ( 522 ) to start state ( 502 ) iteratively for each of a plurality of cardholder ( 104 )-initiated requests to delete, change, and/or update card account data ( 142 ) from respective customer profiles ( 174 ).
- a plurality of instances of process ( 800 ) run in parallel for simultaneously processing a plurality of cardholder ( 104 )-initiated requests to delete, change, and/or update card account data ( 142 ) from respective customer profiles ( 174 ).
- FIG. 9 is a sequence diagram and flow chart of an issuer ( 120 )-initiated process (e.g., process ( 900 )) for updating tokenized purchase card ( 106 ) account data ( 142 ) implemented by the method of FIG. 7 (e.g., method ( 280 )), according to an embodiment of the disclosure.
- process ( 900 ) enables issuer ( 120 ) to notify token service providers ( 112 and/or 116 ) of account closure or change(s) to actual card ( 106 ) PAN and expiration date.
- Process ( 900 ) begins with a start state ( 902 ) and proceeds to block ( 903 ), which is performed by issuer ( 120 ).
- issuer ( 120 ) suspends or deletes the account of the cardholder ( 104 ) associated with the purchase card ( 106 ).
- process ( 900 ) proceeds to block ( 904 ), which is performed by the payment network ( 118 ).
- payment network ( 118 ) receives a suspend/close notification from issuer ( 120 ).
- process ( 900 ) proceeds to block ( 905 ), which is performed by the payment network ( 118 ).
- payment network ( 118 ) transmits the suspend/close notification to the primary TSP ( 112 ).
- primary TSP processor ( 184 ) sends an LCM advice to the merchant ( 108 ).
- process ( 900 ) proceeds to block ( 908 ), which is performed by merchant ( 108 ).
- merchant processor ( 158 ) suspends or deletes the primary token ( 176 ) stored in merchant memory ( 166 ).
- process ( 900 ) proceeds to block ( 910 ), also performed by merchant ( 108 ).
- merchant processor ( 158 ) sends an LCM response to the primary TSP processor ( 184 ).
- process ( 900 ) proceeds to block ( 912 ), which is performed by the primary TSP ( 112 ).
- primary TSP processor ( 184 ) receives the LCM response from the merchant processor ( 158 ).
- process ( 900 ) proceeds to block ( 914 ), which is performed by the merchant ( 108 ).
- merchant processor ( 158 ) sends an LCM advice to the secondary TSP processor ( 194 ).
- process ( 900 ) proceeds to block ( 916 ), which is performed by the secondary TSP ( 116 ).
- secondary TSP processor ( 194 ) processes the LCM request received from the merchant processor ( 158 ). From block ( 916 ), process ( 900 ) proceeds to block ( 918 ), also performed by the secondary TSP ( 116 ). In block ( 918 ), secondary TSP processor ( 194 ) sends an LCM response to the merchant processor ( 158 ).
- process ( 900 ) proceeds to block ( 920 ), which is performed by the merchant ( 108 ).
- merchant processor ( 158 ) suspends or deletes the secondary token ( 178 ) stored in merchant memory ( 166 ).
- process ( 900 ) proceeds to block ( 922 ), also performed by merchant ( 108 ).
- merchant processor ( 158 ) updates the customer profile ( 174 ) of the cardholder/customer ( 104 ).
- process ( 900 ) proceeds to an end state ( 924 ).
- process ( 900 ) transitions from end state ( 924 ) to start state ( 902 ) iteratively for each of a plurality of issuer ( 120 )-initiated requests to delete, change, and/or update card account data ( 142 ) from respective customer profiles ( 174 ).
- a plurality of instances of process ( 900 ) run in parallel for simultaneously processing a plurality of issuer ( 120 )-initiated requests to delete, change, and/or update card account data ( 142 ) from respective customer profiles ( 174 ).
- FIG. 10 is a sequence diagram and flow chart of an issuer ( 120 )-initiated process (e.g., process ( 1000 )) for updating tokenized purchase card ( 106 ) account data ( 142 ), according to another embodiment of the disclosure.
- Process ( 1000 ) begins with a start state ( 1002 ) and proceeds to block ( 1004 ), which is performed by issuer ( 120 ).
- issuer ( 120 ) sends at least one change of state file ( 154 ) to the DN account updater ( 132 ).
- process ( 1000 ) proceeds to block ( 1006 ), which is performed by the DN account updater ( 132 ).
- DN account updater processor ( 156 ) receives the change of state file(s) ( 154 ).
- DN account updater processor ( 156 ) stores the change of state file(s) in a DN account updater database.
- process ( 1000 ) proceeds to logic branch ( 1008 ), which is performed by the secondary TSP ( 116 ).
- secondary TSP processor ( 194 ) determines, based on the change of state file(s) ( 154 ) received in block ( 1006 ), if the cardholder's ( 104 ) account with issuer ( 120 ) is closed or suspended.
- secondary TSP processor ( 194 ) performs logic branch ( 1008 ) operations on a periodic basis to check if a cardholder account ( 104 ) is closed or suspended (e.g., at user-predetermined intervals of time). If secondary TSP processor ( 194 ) determines in branch ( 1008 ) that the cardholder's ( 104 ) account with issuer ( 120 ) is not closed or is not suspended, then process ( 1000 ) proceeds to an end state ( 1010 ).
- process ( 1000 ) proceeds to block ( 1012 ), also performed by secondary TSP ( 116 ).
- secondary TSP processor ( 194 ) sends an LCM advice to the merchant ( 108 ).
- process ( 1000 ) proceeds to block ( 1014 ), which is performed by merchant ( 108 ).
- merchant processor ( 158 ) suspends or deletes the secondary token ( 176 ) stored in merchant memory ( 166 ).
- process ( 1000 ) proceeds to block ( 1016 ), also performed by merchant processor ( 158 ).
- merchant processor ( 158 ) sends an LCM response to the DN account updater processor ( 156 ).
- process ( 1000 ) proceeds to block ( 1018 ), which is performed by secondary TSP ( 116 ).
- secondary TSP processor ( 194 ) receives the LCM response from the merchant processor ( 158 ).
- process ( 1000 ) proceeds to block ( 1020 ), which is performed by the merchant ( 108 ).
- process ( 1000 ) proceeds to the end state ( 1010 ).
- process ( 1000 ) transitions from end state ( 1010 ) to start state ( 1002 ) iteratively for each of a plurality of issuer ( 120 )-initiated change of state file ( 154 ) transmissions.
- a plurality of instances of process ( 1000 ) run in parallel for simultaneously processing a plurality of issuer ( 120 )-initiated transmissions of change of state file(s) ( 154 ).
- FIG. 11 is a block diagram of a processing system ( 603 ) for implementing the disclosed systems, methods, and software, according to an embodiment of the disclosure.
- the processing system ( 603 ) includes at least one processor ( 604 ), including, for example and without limitation, a central processing unit (CPU), which executes computer-executable instructions including embodiments of the system for performing the functions and methods described above.
- processors including, for example and without limitation, a central processing unit (CPU), which executes computer-executable instructions including embodiments of the system for performing the functions and methods described above.
- the computer-executable instructions are locally stored and accessed from a non-transitory computer readable medium, such as storage ( 610 ), which may be a hard drive or flash drive.
- Read Only Memory (ROM) ( 606 ) includes computer executable instructions for initializing the processor ( 604 ), while the random-access memory (RAM) ( 608 ) is the main memory for loading and processing instructions executed by the processor ( 604 ).
- the network interface ( 612 ) may connect to a wired network or cellular network and to a local area network or wide area network, such as the Internet.
- Processor(s) ( 604 ), ROM ( 606 ), RAM ( 608 ), storage ( 610 ), and network interface ( 612 ) may communicate with one another and/or with the network via a bus ( 614 ).
- the at least one processor ( 604 ) includes a plurality of processors 604 .
- the plurality of processors ( 604 ) include the merchant processor(s) ( 158 ) and the secondary TSP processor(s) ( 194 ).
- storage ( 610 ) includes a plurality of memory devices.
- the plurality of memory devices includes at least one instance of the non-transitory computer readable medium.
- the plurality of memory devices include the merchant memory ( 166 ) and the secondary TSP memory ( 140 ).
- the processors ( 158 and 194 ) and the memory devices ( 166 and 140 ) utilize respective network interfaces ( 612 ) to communicate with each over network ( 114 ) for cooperatively implementing, performing, and/or otherwise facilitating the above-described systems, methods, and processes, as shown and described above with reference to FIGS. 1 - 10 ).
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (20)
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/396,323 US11544706B2 (en) | 2019-04-26 | 2019-04-26 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/092,406 US20230145530A1 (en) | 2019-04-26 | 2023-01-02 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/092,408 US20230143954A1 (en) | 2019-04-26 | 2023-01-02 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/173,941 US20230206226A1 (en) | 2019-04-26 | 2023-02-24 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/680,700 US20240320665A1 (en) | 2019-04-26 | 2024-05-31 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/396,323 US11544706B2 (en) | 2019-04-26 | 2019-04-26 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
Related Child Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/092,408 Continuation US20230143954A1 (en) | 2019-04-26 | 2023-01-02 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/092,406 Continuation US20230145530A1 (en) | 2019-04-26 | 2023-01-02 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20200342454A1 US20200342454A1 (en) | 2020-10-29 |
| US11544706B2 true US11544706B2 (en) | 2023-01-03 |
Family
ID=72921535
Family Applications (5)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/396,323 Active 2040-11-12 US11544706B2 (en) | 2019-04-26 | 2019-04-26 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/092,406 Abandoned US20230145530A1 (en) | 2019-04-26 | 2023-01-02 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/092,408 Abandoned US20230143954A1 (en) | 2019-04-26 | 2023-01-02 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/173,941 Abandoned US20230206226A1 (en) | 2019-04-26 | 2023-02-24 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/680,700 Pending US20240320665A1 (en) | 2019-04-26 | 2024-05-31 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
Family Applications After (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/092,406 Abandoned US20230145530A1 (en) | 2019-04-26 | 2023-01-02 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/092,408 Abandoned US20230143954A1 (en) | 2019-04-26 | 2023-01-02 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/173,941 Abandoned US20230206226A1 (en) | 2019-04-26 | 2023-02-24 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
| US18/680,700 Pending US20240320665A1 (en) | 2019-04-26 | 2024-05-31 | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods |
Country Status (1)
| Country | Link |
|---|---|
| US (5) | US11544706B2 (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020250206A1 (en) * | 2019-06-14 | 2020-12-17 | Ailia Sa | Method for the execution of an instance of a smart contract by means of a blockchain |
| US20210397740A1 (en) * | 2020-06-17 | 2021-12-23 | Synchrony Bank | Systems and methods for data security with modular website integration |
| US12113793B1 (en) * | 2023-12-08 | 2024-10-08 | Sandata Technologies, Llc | System and methods for data exchange coordination |
Citations (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080189214A1 (en) * | 2006-10-17 | 2008-08-07 | Clay Von Mueller | Pin block replacement |
| US20090048953A1 (en) * | 2007-08-16 | 2009-02-19 | Patrick Hazel | Metrics systems and methods for token transactions |
| US20120259782A1 (en) * | 2011-04-11 | 2012-10-11 | Ayman Hammad | Multiple tokenization for authentication |
| US20130275245A1 (en) * | 2007-01-30 | 2013-10-17 | Philip B. Dixon | Aggregation of validated transactions for settlement |
| US8768838B1 (en) * | 2005-02-02 | 2014-07-01 | Nexus Payments, LLC | Financial transactions using a rule-module nexus and a user account registry |
| US20150112871A1 (en) * | 2013-10-21 | 2015-04-23 | Phillip Kumnick | Multi-network token bin routing with defined verification parameters |
| US20150199679A1 (en) * | 2014-01-13 | 2015-07-16 | Karthikeyan Palanisamy | Multiple token provisioning |
| US20150242853A1 (en) * | 2014-02-26 | 2015-08-27 | Mastercard International Incorporated | Payment account tokenization method |
| US20150379508A1 (en) * | 2013-02-18 | 2015-12-31 | Touch Networks Australia Pty Ltd | Controlling usage of acquirer tokens stored within a merchant system |
| US20160110709A1 (en) * | 2014-10-20 | 2016-04-21 | Mastercard International Incorporated | Systems and methods for detecting potentially compromised payment cards |
| US20160239833A1 (en) * | 2015-02-17 | 2016-08-18 | Mastercard Asia/Pacific Pte. Ltd. | Methods and systems for processing an electronic payment |
| US20160351200A1 (en) * | 2015-05-27 | 2016-12-01 | Google Inc. | Local persisting of data for selectively offline capable voice action in a voice-enabled electronic device |
| US20180068293A1 (en) * | 2016-09-07 | 2018-03-08 | Mastercard International Incorporated | Method and system for allowing offline peer-2-peer transactions using exchangeable provisioned tokens |
| US10454779B2 (en) * | 2016-08-26 | 2019-10-22 | Paypal, Inc. | Adaptive learning system with a product configuration engine |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9141948B2 (en) * | 2007-11-30 | 2015-09-22 | U.S. Bank National Association | Control system arrangements and methods for disparate network systems |
| US8523053B2 (en) * | 2008-09-03 | 2013-09-03 | First Data Corporation | Enabling consumer choice on contactless transactions when using a dual-branded payment instrument |
| WO2012162351A1 (en) * | 2011-05-23 | 2012-11-29 | Mastercard International, Inc. | Combicard transaction method and system having an application parameter update mechanism |
| US20130103577A1 (en) * | 2011-10-24 | 2013-04-25 | Fiserv, Inc. | Systems and methods for optimizing financial transactions |
| CN105874495B (en) * | 2013-07-24 | 2021-08-10 | 维萨国际服务协会 | System and method for ensuring data transfer risk using tokens |
| US20150039517A1 (en) * | 2013-08-05 | 2015-02-05 | Mozido, Inc. | Cloud entertainment platform |
| US9229987B2 (en) * | 2013-09-30 | 2016-01-05 | Protegrity Corporation | Mapping between tokenization domains |
| US20170161733A1 (en) * | 2015-12-02 | 2017-06-08 | Mastercard International Incorporated | Method and system for validation of a token requestor |
| US10313321B2 (en) * | 2016-04-07 | 2019-06-04 | Visa International Service Association | Tokenization of co-network accounts |
| US10509779B2 (en) * | 2016-09-14 | 2019-12-17 | Visa International Service Association | Self-cleaning token vault |
-
2019
- 2019-04-26 US US16/396,323 patent/US11544706B2/en active Active
-
2023
- 2023-01-02 US US18/092,406 patent/US20230145530A1/en not_active Abandoned
- 2023-01-02 US US18/092,408 patent/US20230143954A1/en not_active Abandoned
- 2023-02-24 US US18/173,941 patent/US20230206226A1/en not_active Abandoned
-
2024
- 2024-05-31 US US18/680,700 patent/US20240320665A1/en active Pending
Patent Citations (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8768838B1 (en) * | 2005-02-02 | 2014-07-01 | Nexus Payments, LLC | Financial transactions using a rule-module nexus and a user account registry |
| US20080189214A1 (en) * | 2006-10-17 | 2008-08-07 | Clay Von Mueller | Pin block replacement |
| US20130275245A1 (en) * | 2007-01-30 | 2013-10-17 | Philip B. Dixon | Aggregation of validated transactions for settlement |
| US20090048953A1 (en) * | 2007-08-16 | 2009-02-19 | Patrick Hazel | Metrics systems and methods for token transactions |
| US20120259782A1 (en) * | 2011-04-11 | 2012-10-11 | Ayman Hammad | Multiple tokenization for authentication |
| US20150379508A1 (en) * | 2013-02-18 | 2015-12-31 | Touch Networks Australia Pty Ltd | Controlling usage of acquirer tokens stored within a merchant system |
| US20150112871A1 (en) * | 2013-10-21 | 2015-04-23 | Phillip Kumnick | Multi-network token bin routing with defined verification parameters |
| US20150199679A1 (en) * | 2014-01-13 | 2015-07-16 | Karthikeyan Palanisamy | Multiple token provisioning |
| US20150242853A1 (en) * | 2014-02-26 | 2015-08-27 | Mastercard International Incorporated | Payment account tokenization method |
| US20160110709A1 (en) * | 2014-10-20 | 2016-04-21 | Mastercard International Incorporated | Systems and methods for detecting potentially compromised payment cards |
| US20160239833A1 (en) * | 2015-02-17 | 2016-08-18 | Mastercard Asia/Pacific Pte. Ltd. | Methods and systems for processing an electronic payment |
| US20160351200A1 (en) * | 2015-05-27 | 2016-12-01 | Google Inc. | Local persisting of data for selectively offline capable voice action in a voice-enabled electronic device |
| US10454779B2 (en) * | 2016-08-26 | 2019-10-22 | Paypal, Inc. | Adaptive learning system with a product configuration engine |
| US20180068293A1 (en) * | 2016-09-07 | 2018-03-08 | Mastercard International Incorporated | Method and system for allowing offline peer-2-peer transactions using exchangeable provisioned tokens |
Also Published As
| Publication number | Publication date |
|---|---|
| US20200342454A1 (en) | 2020-10-29 |
| US20230143954A1 (en) | 2023-05-11 |
| US20240320665A1 (en) | 2024-09-26 |
| US20230145530A1 (en) | 2023-05-11 |
| US20230206226A1 (en) | 2023-06-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TWI640937B (en) | Online payment method and equipment | |
| AU2019283784A1 (en) | Methods and systems for providing 3-D secure service on-behalf-of merchants | |
| US20230145530A1 (en) | Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods | |
| CN108701305A (en) | Digital asset is converted | |
| AU2015347054B2 (en) | Providing online cardholder authentication services on-behalf-of issuers | |
| JP6009942B2 (en) | Method and system for electronic payment processing using smart / authentication fields and definitions | |
| US11823224B1 (en) | Pay with points virtual card | |
| US20230122831A1 (en) | Providing computer-generated contextual data to an end-point during a digital transaction | |
| KR102480307B1 (en) | Systems and methods for authorizing and provisioning tokens to appliances | |
| US11037121B2 (en) | Secure real-time transactions | |
| WO2024215307A1 (en) | Devices, systems, and methods for seamlessly integrating and facilitating the use of fiat and digital assets | |
| US20260004282A1 (en) | Token services for non-fungible tokens | |
| CN119605125A (en) | Token services for non-fungible tokens | |
| WO2025080268A1 (en) | Method and system for processing smart qr code transactions | |
| KR20250105401A (en) | System and method for processing transactions from a cryptocurrency wallet |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| AS | Assignment |
Owner name: DISCOVER FINANCIAL SERVICES, ILLINOIS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MANKA, BRYAN L.;DANFORTH, GEORGE;REEL/FRAME:050245/0493 Effective date: 20190829 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| CC | Certificate of correction | ||
| AS | Assignment |
Owner name: CAPITAL ONE FINANCIAL CORPORATION, VIRGINIA Free format text: MERGER;ASSIGNOR:DISCOVER FINANCIAL SERVICES;REEL/FRAME:071784/0903 Effective date: 20250516 |